Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Fayyn Fenshaw

A 24-year-old hacker has confessed to gaining unauthorised access to numerous United States government systems after publicly sharing his illegal activities on Instagram under the handle “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unauthorisedly entering secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, leveraging compromised usernames and passwords to gain entry on numerous occasions. Rather than concealing his activities, Moore openly posted screenshots and sensitive personal information on online platforms, including details extracted from a veteran’s health records. The case highlights both the fragility of state digital defences and the careless actions of cyber perpetrators who seek internet fame over protective measures.

The shameless online attacks

Moore’s hacking spree revealed a troubling pattern of systematic, intentional incursions across numerous state institutions. Court filings show he penetrated the US Supreme Court’s online filing infrastructure at least 25 times over a span of two months, systematically logging into secure networks using credentials he had obtained illegally. Rather than conducting a lone opportunistic attack, Moore went back to these compromised systems numerous times each day, indicating a deliberate strategy to investigate restricted materials. His actions exposed classified data across three separate government institutions, each containing information of significant national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a publicly documented criminal record. The case demonstrates how online hubris can undermine otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court document repository 25 times across a two-month period
  • Compromised AmeriCorps accounts and Veterans Affairs medical portal
  • Shared screenshots and personal information on Instagram to the public
  • Logged into protected networks numerous times each day with compromised login details

Social media confession proves expensive

Nicholas Moore’s decision to broadcast his unlawful conduct on Instagram became his ruin. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and private data belonging to victims, including sensitive details extracted from armed forces healthcare data. This brazen documentation of federal crimes changed what might have remained hidden into irrefutable evidence easily accessible to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be gaining favour with digital associates rather than gaining monetary advantage from his unlawful entry. His Instagram account practically operated as a confessional, providing investigators with a detailed timeline and account of his criminal enterprise.

The case constitutes a cautionary tale for cybercriminals who place emphasis on digital notoriety over operational security. Moore’s actions demonstrated a basic lack of understanding of the repercussions of publicising federal crimes. Rather than maintaining anonymity, he created a lasting digital trail of his intrusions, complete with photographic evidence and personal commentary. This irresponsible conduct expedited his apprehension and prosecution, ultimately leading to criminal charges and legal proceedings that have now become public knowledge. The contrast between Moore’s technical proficiency and his disastrous decision-making in broadcasting his activities highlights how social networks can convert complex cybercrimes into easily prosecutable offences.

A tendency towards overt self-promotion

Moore’s Instagram posts revealed a disturbing pattern of escalating confidence in his criminal abilities. He consistently recorded his entry into classified official systems, sharing screenshots that illustrated his breach into confidential networks. Each post represented both a admission and a form of digital boasting, designed to display his technical expertise to his online followers. The material he posted included not only evidence of his breaches but also private data of people whose information he had exposed. This pressing urge to broadcast his offences indicated that the excitement of infamy took precedence over Moore than the seriousness of what he had done.

Prosecutors portrayed Moore’s behaviour as performative rather than predatory, highlighting he was motivated primarily by the wish to impress acquaintances rather than utilise stolen information for financial advantage. His Instagram account functioned as an unintentional admission, with each post providing law enforcement with further evidence of his guilt. The permanence of the platform meant Moore was unable to delete his crimes from existence; instead, his digital boasting created a detailed record of his activities spanning multiple breaches and multiple government agencies. This pattern ultimately determined his fate, turning what might have been hard-to-prove cybercrimes into clear-cut prosecutions.

Lenient sentences and systemic vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors chose not to recommend custodial punishment, citing Moore’s difficult circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to web-based associates further shaped the lenient decision.

The prosecution’s own evaluation characterised a disturbed youth rather than a major criminal operator. Court documents noted Moore’s long-term disabilities, restricted monetary means, and practically non-existent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for personal gain or provided entry to external organisations. Instead, his crimes seemed motivated by youthful self-regard and the desire for online acceptance through digital prominence. Judge Howell even remarked during sentencing that Moore’s technical capabilities indicated considerable capacity for beneficial participation to society, provided he redirected his interests away from criminal activity. This assessment embodied a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case uncovers troubling gaps in American federal cyber security infrastructure. His capacity to breach Supreme Court document repositories 25 times across two months using pilfered access credentials suggests concerningly weak credential oversight and access control protocols. Judge Howell’s sardonic observation about Moore’s capacity for positive impact—given how easily he breached restricted networks—underscored the systemic breakdowns that facilitated these security incidents. The incident demonstrates that government agencies remain at risk to fairly basic attacks dependent on compromised usernames and passwords rather than sophisticated technical attacks. This case acts as a cautionary tale about the implications of insufficient password protection across federal systems.

Extended implications for public sector cyber security

The Moore case has revived worries regarding the digital defence position of US government bodies. Cybersecurity specialists have repeatedly flagged that public sector infrastructure often lag behind private enterprise practices, depending upon outdated infrastructure and irregular security procedures. The reality that a young person without professional credentials could repeatedly access the US Supreme Court’s electronic filing system raises uncomfortable questions about resource allocation and institutional priorities. Bodies responsible for safeguarding classified government data seem to have under-resourced in basic security measures, creating vulnerability to exploitative incursions. The incidents disclosed not just administrative files but medical information from service members, demonstrating how inadequate protection adversely influences vulnerable populations.

Looking ahead, cybersecurity experts have urged mandatory government-wide audits and updating of outdated infrastructure still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems on multiple occasions without triggering alarms indicates inadequate oversight and intrusion detection systems. Federal agencies must prioritise investment in experienced cybersecurity staff and infrastructure upgrades, especially considering the increasing sophistication of state-backed and criminal cyber attacks. The Moore case illustrates that even low-tech breaches can reveal classified and sensitive information, making basic security hygiene a issue of national significance.

  • Public sector organisations need compulsory multi-factor authentication throughout all systems
  • Regular security audits and security testing should identify vulnerabilities proactively
  • Security personnel and training require significant funding growth across federal government